Solved

Recommendation on some C# design patterns.

Posted on 2015-01-22
4
152 Views
Last Modified: 2015-01-28
I have used many built in .NET Patterns, such as IEnumerable. I want to "Roll my own" design patterns so to speak. What would be a useful design pattern to learn? Also suppose you have to create a data access layer in C#. Is there a particular pattern that is used for a DAL? The application I am working on is a desktop application.
0
Comment
Question by:brgdotnet
4 Comments
 
LVL 33

Assisted Solution

by:Mike Eghtebas
Mike Eghtebas earned 167 total points
ID: 40565750
0
 
LVL 74

Accepted Solution

by:
käµfm³d   👽 earned 167 total points
ID: 40565775
There are countless design patterns, so you may want to narrow your focus. Some common patterns are (in no particular order):

(Abstract) Factory
Decorator
Facade
Singleton (though some consider an anti-pattern)
Observer
Command
State
Adapter
Proxy
Model-View-Presenter (MVP)
Model-View-Controller (MVC)
0
 
LVL 2

Author Comment

by:brgdotnet
ID: 40565792
I know about all of the pattern names. Google can tell me that. I need to hear from an expert who has a lot of experience with design patterns.
0
 
LVL 23

Assisted Solution

by:Michael74
Michael74 earned 166 total points
ID: 40565818
What sort patterns are you talking about as this subject is very broad. There are 23 patterns which are considered to be the foundation of all other design patterns and these are broken into three groups Creational, Structural, and Behavioral. Which ones to learn would be highly dependent on your goals.

Two I would recommend are the Iterator and Singleton patterns

If you are really interested in the subject I would recommend getting a copy of "Design Patterns: Elements of Reusable Object-Oriented Software".
http://en.wikipedia.org/wiki/Design_Patternshttp://en.wikipedia.org/wiki/Design_Patterns

and here is a site with C# examples of the foundation patterns
http://www.dofactory.com/net/design-patterns
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Introduction                                                 Was the var keyword really only brought out to shorten your syntax? Or have the VB language guys got their way in C#? What type of variable is it? All will be revealed.   Also called…
In order to hide the "ugly" records selectors (triangles) in the rowheaders, here are some suggestions. Microsoft doesn't have a direct method/property to do it. You can only hide the rowheader column. First solution, the easy way The first sol…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now